HHS Proposes Changes to HIPAA Security Rule to Strengthen Cybersecurity in Healthcare
Drew Neckar
Security Management Executive & Consultant - Board certified in multiple aspects of security and violence prevention (CPP, CTM, CHPA, & CPD) and business focused with an MBA in international business.
(Reposted from COSECURE )
On January 6, 2025, the U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rulemaking (NPRM) outlining significant updates to the HIPAA Security Rule. These changes aim to enhance cybersecurity, improve patient data protection, and ensure healthcare organizations are prepared to mitigate the growing threat of cyberattacks.
Given the 92% increase in cyberattacks on healthcare entities in 2024, these proposed updates seek to reduce business disruptions, protect patient information, and strengthen compliance requirements. The changes will require significant adjustments from healthcare organizations as they work toward compliance.
To understand the potential impact, we consulted Drew Neckar , a healthcare security executive and Principal Consultant at COSECURE Enterprise Risk Solutions, and Stig Ravdal Ravdal, CEO of Ravdal Security Consulting, to provide insight into the most impactful changes.
Who Is Affected? Understanding Covered Entities
The proposed HIPAA updates apply to covered entities, which include healthcare providers, health plans, and healthcare clearinghouses that electronically transmit protected health information (PHI).
Definition of Covered Entities
Covered entities must comply with HIPAA because they handle sensitive patient health data. They include:
These entities must prioritize cybersecurity measures to comply with the new requirements and protect PHI.
Background: Strengthening HIPAA Over Time
The HIPAA Security Rule has evolved through several legislative updates, including:
The newly proposed 2025 updates further strengthen data security, access controls, and compliance obligations for covered entities.
Key Changes in the Proposed HIPAA Security Rule
The proposed changes require implementation of a number of technical and procedural safeguards for organizations’ data systems that may not already be in place.? The proposed rule also includes changes to physical security policies under §164.310 Physical Safeguards. These changes may require significant time and effort for organizations to implement, some of them that we anticipate to be most challenging include:
Covered entities must implement MFA with limited exceptions. This requirement may be costly and complex, particularly for organizations with legacy systems. Additionally, it will require staff training to ensure proper implementation.
Organizations must conduct:
Vulnerability Scanning at least every six months
Penetration Testing at least once per year
This change requires investments in technology, personnel, and remediation efforts, which could be challenging for organizations with limited IT security resources.
All electronic protected health information (ePHI) must be encrypted both at rest and in transit, with very few exceptions. Many organizations will need to invest in new encryption technologies, which could be costly.
Organizations must have formal policies detailing what physical security measures they have implemented to protect their PHI and the systems it resides on.
Every modification, repair, or update to physical security systems (e.g., locks, cameras, access controls) must be formally tracked and documented.
Organizations must ensure they are following the protection plans that they have documented in their plans.
Organizations must also review and test these security measures at least every 12 months.
This testing should include penetration testing to assess physical vulnerabilities and identify potential gaps that would allow a criminal to inappropriately access protected components of the information systems.
Handheld devices (phones, tablets) accessing PHI must be protected similarly to laptops and desktops.
Timeline For Final Rule & Compliance
The public comment period for the proposed rule ends on March 7, 2025, after which a Final Rule will be published by HHS once any comments have been considered.
Once the final rule is published, it will most likely:
With a timeline of only six (6) to nine (9) months, healthcare organizations must act now and start preparing now to avoid non-compliance risks.
What Organizations Should Do Now
1. Conduct a Risk Assessment & Gap Analysis
2. Develop an Implementation Plan
3. Start Implementing Changes
4. Review & Update Policies & Procedures
5. Secure Funding for Compliance
6. Educate Leadership & Staff
7. Strengthen Vendor & Partner Relationships
Final Thoughts: Preparing for the Future
With these sweeping changes, healthcare organizations must act now to avoid last-minute compliance challenges. By investing in security measures, updating policies, and engaging leadership early, organizations can minimize disruption and ensure they are ready when the final rule takes effect.
For more information on preparing, consider consulting with HIPAA compliance experts, cybersecurity, and physical security professionals to ensure your organization remains secure and compliant.
Help in solving Cybersecurity concerns in compliance, automation, productivity through Technology and Consulting expertise.
1 周Love the partnership..